Active Attack Blocking & How it Works
Active attack blocking works with tools developed by, Network Defense Solutions, Inc. to scan and ingest your logs (if available through your host). If any of our tools detect web application based attacks they will either block the offending IP address indefinitely or alert the administrators (via e-mail alert) that a threat actor is attempting to access your web location.
If active attack blocking is enabled, weekly Network Defense Solutions will analyze any IP addresses which may have made contact with your location and provide a report based on the threat actors IP address. Report information includes geographic location, if other users within our threat defense ecosystem have seen it before and, if it has been part of any recent breaches.
Customers may also choose to remove aging IP addresses or other threat actors if they have not been seen within X amount of days.
What is Included
Active Attack Blocking includes a set of tools that run both server-side and client-side for the customer enrolled within the active attack blocking program. Customers can modify, create or, delete blocking rules as well as backup blocking rules to deploy on other web sites that the customer maintains. The customer will be given desktop tools which connect to the systems and act as an easy to use WYSIWYG (What you see is what you get) editor to help you quickly create rules for your web site.
Weekly or, monthly reporting can also be created for the customers enrolled within the program to review and see where attacks are originating from. This can also assist in creating larger policies for blocking, logging or both!
If you would like more information about the program or how it can help protect your web location, please feel free to reach out. Our turn around time is normally 1-2 hours and one of our representatives would be glad to assist you.
{loadformmaker 16}